CN107864065B - Non-buried point data acquisition method, system and computer readable storage medium - Google Patents

Non-buried point data acquisition method, system and computer readable storage medium Download PDF

Info

Publication number
CN107864065B
CN107864065B CN201710705108.4A CN201710705108A CN107864065B CN 107864065 B CN107864065 B CN 107864065B CN 201710705108 A CN201710705108 A CN 201710705108A CN 107864065 B CN107864065 B CN 107864065B
Authority
CN
China
Prior art keywords
control
data
data acquisition
server
acquisition terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710705108.4A
Other languages
Chinese (zh)
Other versions
CN107864065A (en
Inventor
徐佳良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201710705108.4A priority Critical patent/CN107864065B/en
Publication of CN107864065A publication Critical patent/CN107864065A/en
Application granted granted Critical
Publication of CN107864065B publication Critical patent/CN107864065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/028Capturing of monitoring data by filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Abstract

The invention discloses a non-buried point data acquisition method, a data acquisition system and a computer readable storage medium, wherein the non-buried point data acquisition method comprises the following steps: when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position; the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control; and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server. According to the invention, the data acquisition terminal acquires the full data, and the server performs data filtering and intercepting to acquire real and effective data information, so that the phenomenon of low data acquisition efficiency caused by long buried point data acquisition buried point engineering development time and workload redundancy is avoided, and further, complicated buried point technology development is not required, the data acquisition period is shortened, and the data acquisition efficiency is improved.

Description

Non-buried point data acquisition method, system and computer readable storage medium
Technical Field
The invention relates to the technical field of data acquisition, in particular to a non-buried point data acquisition method, a data acquisition system and a computer readable storage medium.
Background
At present, most of the modes for collecting user behavior characteristics by a client are point-buried collection through an SDK (software development kit), namely, a developer implants an accurate data collection code in the SDK, and after the user installs the client, the data collection code carries out targeted user behavior data collection. However, the embedded point collection technology has a great defect, the embedded point collection needs to be performed in advance through a long-term development process, and the data collected by the embedded point needs to be organized and edited by a developer or actively reported to a server after secondary development, which leads to complex and redundant development workload of the developer and low data collection efficiency.
Disclosure of Invention
The invention mainly aims to provide a non-buried point data acquisition method, a data acquisition system and a computer readable storage medium, and aims to solve the technical problem of low data acquisition efficiency caused by long development time and complex workload of a buried point acquisition technology.
In order to achieve the above object, an embodiment of the present invention provides a method for collecting non-buried point data, where the method for collecting non-buried point data includes:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
Preferably, the step of acquiring all control data of the target control by the data acquisition terminal includes:
the data acquisition terminal acquires all control data of the target control;
the data acquisition terminal identifies the data type of the control data;
and the data acquisition terminal performs data classification on the control data based on the data type to obtain normalized control data.
Preferably, the step of obtaining the control identifier of the target control comprises:
the method comprises the steps that a data acquisition terminal acquires control acquisition rules sent by a server, wherein the control acquisition rules comprise a control white list;
and the data acquisition terminal determines the control to be acquired based on the white list of the control and acquires the control identifier of the control to be acquired.
Preferably, the step of setting the control identifier as a first control identifier, and the step of sending the first control identifier and all control data of the target control to the server by the data acquisition terminal includes:
when a data acquisition terminal receives a first filtering rule sent by a server, acquiring a second control identifier in the first filtering rule, wherein the second control identifier is a control identifier of a control to be filtered;
when the data acquisition terminal detects a first control identifier matched with a second control identifier, filtering all control data of a target control corresponding to the first control identifier and the first control identifier to obtain a new first control identifier and a new target control;
and the data acquisition terminal sends the new first control identifier and all control data of the new target control to the server.
Preferably, the step of sending the control identifier and all control data of the target control to the server by the data acquisition terminal includes:
the data acquisition terminal carries out symmetric algorithm encryption on the control identifier and all control data of the target control to obtain encrypted data;
and the data acquisition terminal sends the encrypted data to the server.
The invention also provides a non-buried point data acquisition method, which comprises the following steps:
the server acquires a control identifier and control data sent by the data acquisition terminal;
the server filters the control identifier and the control data based on a preset second filtering rule to obtain target control data;
and the server performs statistical analysis on the target control data to obtain a behavior characteristic analysis report.
Preferably, the step of the server obtaining the control identifier and the control data sent by the data acquisition terminal further includes:
and the server sends a preset first filtering rule to the data acquisition terminal so that the data acquisition terminal can filter the acquired first control identifier and control data.
Preferably, the step of statistically analyzing the target control data by the server to obtain the behavior feature analysis report further includes:
the server analyzes data based on the behavior characteristic analysis report to obtain control collection rules;
and the server sends the control acquisition rule to the data acquisition terminal so that the data acquisition terminal can acquire data in a targeted manner.
The present invention also provides a data acquisition system, comprising: a data acquisition terminal, a server, a memory, a processor, a communication bus and a data acquisition program stored on the memory,
the communication bus is used for realizing communication connection between the processor and the memory;
the processor is configured to execute the data collection program to implement the steps of:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
Preferably, the step of acquiring all control data of the target control by the data acquisition terminal includes:
the data acquisition terminal acquires all control data of the target control;
the data acquisition terminal identifies the data type of the control data;
and the data acquisition terminal performs data classification on the control data based on the data type to obtain normalized control data.
Preferably, the step of obtaining the control identifier of the target control comprises:
the method comprises the steps that a data acquisition terminal acquires control acquisition rules sent by a server, wherein the control acquisition rules comprise a control white list;
and the data acquisition terminal determines the control to be acquired based on the white list of the control and acquires the control identifier of the control to be acquired.
Preferably, the step of setting the control identifier as a first control identifier, and the step of sending the first control identifier and all control data of the target control to the server by the data acquisition terminal includes:
when a data acquisition terminal receives a first filtering rule sent by a server, acquiring a second control identifier in the first filtering rule, wherein the second control identifier is a control identifier of a control to be filtered;
when the data acquisition terminal detects a first control identifier matched with a second control identifier, filtering all control data of a target control corresponding to the first control identifier and the first control identifier to obtain a new first control identifier and a new target control;
and the data acquisition terminal sends the new first control identifier and all control data of the new target control to the server.
Preferably, the step of sending the control identifier and all control data of the target control to the server by the data acquisition terminal includes:
the data acquisition terminal carries out symmetric algorithm encryption on the control identifier and all control data of the target control to obtain encrypted data;
and the data acquisition terminal sends the encrypted data to the server.
The invention also provides a data acquisition program to realize the following steps:
the server acquires a control identifier and control data sent by the data acquisition terminal;
the server filters the control identifier and the control data based on a preset second filtering rule to obtain target control data;
and the server performs statistical analysis on the target control data to obtain a behavior characteristic analysis report.
Preferably, the step of the server obtaining the control identifier and the control data sent by the data acquisition terminal further includes:
and the server sends a preset first filtering rule to the data acquisition terminal so that the data acquisition terminal can filter the acquired first control identifier and control data.
Preferably, the step of statistically analyzing the target control data by the server to obtain the behavior feature analysis report further includes:
the server analyzes data based on the behavior characteristic analysis report to obtain control collection rules;
and the server sends the control acquisition rule to the data acquisition terminal so that the data acquisition terminal can acquire data in a targeted manner.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors for:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
According to the technical scheme, firstly, when a data acquisition terminal detects that data interaction exists at a preset acquisition position, a target control at the preset acquisition position is determined; then the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control; and finally, the data acquisition terminal sends the control identifier and all control data of the target control to a server for statistical analysis by the server. According to the invention, the data acquisition terminal acquires the full data, and the server performs data filtering and intercepting to acquire real and effective data information, so that the phenomenon of low data acquisition efficiency caused by long buried point data acquisition buried point engineering development time and workload redundancy is avoided, and further, complicated buried point technology development is not required, the data acquisition period is shortened, and the data acquisition efficiency is improved.
Drawings
FIG. 1 is a schematic flow chart of a non-buried point data collection method according to a first embodiment of the present invention;
fig. 2 is a detailed flowchart of a step in which the data acquisition terminal sends the first control identifier and all control data of the target control to the server in the second embodiment of the non-buried point data acquisition method of the present invention;
FIG. 3 is a flowchart illustrating a detailed process of the step of obtaining the control identifier of the target control in the third embodiment of the non-buried point data collection method according to the present invention;
fig. 4 is a detailed flowchart of a step in which the data acquisition terminal sends the control identifier and all control data of the target control to the server in the fourth embodiment of the non-buried point data acquisition method of the present invention;
FIG. 5 is a detailed flowchart of the step of sending the encrypted data to the server by the data acquisition terminal in the fifth embodiment of the non-buried point data acquisition method according to the present invention;
FIG. 6 is a schematic flow chart illustrating a method for collecting non-buried point data according to a sixth embodiment of the present invention;
FIG. 7 is a schematic flow chart illustrating a method for collecting non-buried point data according to a seventh embodiment of the present invention;
FIG. 8 is a schematic flow chart illustrating an eighth embodiment of a non-buried point data collection method according to the present invention;
FIG. 9 is a schematic diagram of a system for data acquisition according to the present invention;
fig. 10 is a schematic device structure diagram of a hardware operating environment according to a method of an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a non-buried point data acquisition method, in a first embodiment of the non-buried point data acquisition method, referring to fig. 1, the non-buried point data acquisition method comprises the following steps:
step S10, when the data acquisition terminal detects that there is data interaction on the preset acquisition position, determining a target control on the preset acquisition position;
the data acquisition terminal is mainly used for acquiring the behavior characteristic data of the user and is used as a reference data source for analyzing the behavior characteristic of the user. The data collected by the data collection terminal is data in the terminal, such as APP application software frequently used by a user, or commodity content attributes with the highest purchase frequency of the user in an e-commerce APP, and the like. The preset acquisition position refers to the position of a control to be acquired, which is set by a user in advance. The non-buried point data collection is not required to be designed by a code program, but is carried out with pertinence according to the attribute of the control. The control directly carries out data interaction on a user, the user needs to operate on a terminal, usually, the position of the control of an application or a program of a public testing version cannot be changed greatly, the man-machine interaction position where the control data generates interaction is known in a single display page, and a developer can deploy the position as a preset acquisition position, so that all data on the position can be directly acquired. And as long as the control exists in the preset acquisition position, the generated data interaction information is acquired. Because the data acquired by the invention is used for analyzing the user behavior, the data acquired by the data acquisition terminal is data generated or changed based on the operation of the user. Meanwhile, because the data generated or changed when the terminal interacts with the user is controlled based on the control, the embodiment can position the specific control by monitoring the data change of the control in the terminal in real time.
The controls are packages of data and methods. The control has attributes and a method, the attributes are simple visitors of the control data, and the method is a basis for the control to realize functions. Therefore, the control can control the interactive data between the user and the terminal, once the data changes, the fact that the user and the terminal are executing interactive operation is proved, at the moment, the data acquisition terminal directly detects all the controls on the preset acquisition position and determines the target control on which the data interaction specifically occurs.
Step S20, the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
in the data acquisition mode of the embedded point technology, as long as various detection points (namely detection codes) aiming at a specific control are deployed in a program code of an application or a webpage, all dynamic changes of data on the control are collected in real time, in the implementation principle, the control corresponding to the detection points and needing to be acquired needs to be inquired according to the detection points, and then the specific control data in the control is acquired based on an acquisition method in the detection points. Compared with a buried point technology, the data acquisition code aiming at the control is deployed on the position of the control of data to be acquired on an application or a webpage in advance in the non-buried point data acquisition technology. Namely, the non-buried point data acquisition technology is directly positioned on the target control and acquires all data on the target control without acquiring specific control data. And the development workload of a large amount of targeted data acquisition can be saved by acquiring the full amount of data.
After the target control is determined, the data acquisition terminal can directly acquire and acquire all control data of the current target control. The invention relates to a data acquisition method of a non-buried point technology, so that the acquisition object of a data acquisition terminal is any control on a preset acquisition position in the terminal, namely the data acquisition terminal acquires the full data on the preset acquisition position. The control data in the target control can be form information, an operation instruction, custom data and the like, and is determined according to a data format fixed by functions specifically realized and controlled by the control. The target control is a carrier unit supported by control data with data change detected by the data acquisition terminal.
The control identifier refers to ID information of the control, the control is a carrier container of the control data, and in order to ensure correct identification of the source of the control data, generally, the carrier container of the control data is provided with a corresponding control identifier (such as a control number) which can be uniquely mapped to a specific control, so that a data acquisition device can conveniently acquire the control identifier of the control.
Because the control identifier is the unique identifying feature of the control, the data collection terminal can be positioned to a specific control according to the control identifier. The control identifier can be used as an important reference for identifying, controlling and screening the available controls by the subsequent data acquisition terminal and the server. The data acquisition terminal can detect whether data change occurs in the terminal in real time, but can not directly detect the change, and whether the data interaction change belongs to effective information can be determined according to analysis. Assuming invalid data, all control data under the control is useless, and all control data under the control can be distinguished by the control identifier.
The control identifier and the control data have a corresponding mapping relationship, and the control identifier represents a control object, while the control data exists depending on the control object, that is, different control identifiers correspond to different control data. Through the control identifier, the data acquisition terminal can be positioned to a specific control object and carries out data processing on control data borne by the data acquisition terminal according to different control objects.
And step S30, the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
The collection of control data is to analyze the behavior characteristics of a user, and generally, a data collection terminal is limited by hardware configuration or functional limitation, which is inconvenient for statistical analysis of data. The embodiment provides the background server corresponding to the data acquisition terminal, and the data acquisition terminal only needs to send the control data and the corresponding control identifier to the server, and the server performs data statistical analysis. Referring to fig. 9, fig. 9 is a schematic diagram of a system according to the present invention, and it is assumed that the data acquisition terminal is a mobile terminal, and the mobile terminal sends control data acquired through real-time detection to a corresponding server through a data transmission channel. The data transmission channel may be a bluetooth channel, a wireless WiFi channel, a data network channel, and so on.
Specifically, in the complete non-buried point data acquisition process, the data acquisition terminal acquires all control data with data change, single data acquisition is not needed for specific controls by using a complicated buried point data acquisition technology, a complex development flow is not needed for a data acquisition mode of full data, and meanwhile, the acquired control data are not missed, the comprehensive data collection mode forms an all-round data storage, and the follow-up new function requirement is not needed to be acquired again.
According to the technical scheme, firstly, when a data acquisition terminal detects that data interaction exists at a preset acquisition position, a target control at the preset acquisition position is determined; then the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control; and finally, the data acquisition terminal sends the control identifier and all control data of the target control to a server for statistical analysis by the server. According to the invention, the data acquisition terminal acquires the full data, and the server performs data filtering and intercepting to acquire real and effective data information, so that the phenomenon of low data acquisition efficiency caused by long buried point data acquisition buried point engineering development time and workload redundancy is avoided, and further, complicated buried point technology development is not required, the data acquisition period is shortened, and the data acquisition efficiency is improved.
Further, on the basis of the first embodiment of the non-buried point data collection method of the present invention, a second embodiment of the non-buried point data collection method is proposed, and referring to fig. 2, a difference between the second embodiment and the first embodiment is that the step of collecting all control data of the target control by the data collection terminal includes:
step S21, the data acquisition terminal acquires all control data of the target control;
step S22, the data acquisition terminal identifies the data type of the control data;
the control data collected by the data collection terminal may be different types of data, so that the server can better apply the data collected by the data collection terminal, and in this embodiment, when all the control data of the target control are collected, the data types of the control data can be analyzed and identified. For example, the control data is divided into interface data, user data, statistical data and the like, and the control data can be classified according to actual situations. It can be understood that the data type of the control data is generally defined by the data acquisition terminal in advance, and may also be set by the user.
And step S23, the data acquisition terminal classifies the control data based on the data type to obtain the normalized control data.
And further, by identifying the data type of the control data, the control data is subjected to data classification by taking the data type as a reference. The data classification can be performed by inducing and dividing the control data with the same attribute, for example, counting the types (such as a display interface where a user operates and a webpage where the user operates) belonging to the interface data, so that the control data belonging to the interface data are classified in a centralized manner, confusion of the control data is avoided, management and calling are facilitated, and the normalized control data is obtained for calling or statistical analysis by the server.
Further, on the basis of the first embodiment of the non-buried point data collection method of the present invention, a third embodiment of the non-buried point data collection method is proposed, and referring to fig. 3, a difference between the third embodiment and the first embodiment is that the step of obtaining the control identifier of the target control includes:
step S24, the data acquisition terminal acquires control acquisition rules sent by the server, wherein the control acquisition rules comprise a control white list;
before acquiring the control identifier, the data acquisition terminal may receive the control acquisition rule sent by the acquisition server. The control acquisition rule refers to specific controls which the data acquisition terminal is allowed to acquire, that is, the control acquisition rule divides the control data acquired by the data acquisition terminal and determines which control data need to be acquired, so that the data acquisition efficiency is improved. Therefore, the control collection rule comprises a control white list, which specifies which controls the data collection terminal needs to collect.
It should be noted that the control acquisition rule directly stipulates that the data acquisition terminal acquires the control data of a specific control, and the acquired control data is required accurate data and can be directly used as a reference data source, and analysis and screening are performed after the data is acquired in full quantity, so that the acquisition of invalid control data is omitted, the source control of the required data acquisition is directly positioned, and the data acquisition efficiency and the data acquisition quality are improved.
And the control acquisition rule can be statistically analyzed through the server and sent to the data acquisition terminal, and the control acquisition rule can be played in the next data acquisition period.
And step S25, the data acquisition terminal determines the control to be acquired based on the white list of the control, and acquires the control identifier of the control to be acquired.
And the data acquisition terminal determines a control to be acquired for controlling and bearing the control data according to the control data to be acquired specified in the control white list, and acquires a control identifier of the control to be acquired. The control to be acquired is a control object of the control data to be acquired by the data acquisition terminal, and the control to be acquired is provided with the control identifier, so that the data acquisition terminal can directly acquire the control identifier of the control to be acquired.
Further, on the basis of the first embodiment of the non-buried point data collection method of the present invention, a fourth embodiment of the non-buried point data collection method is proposed, and with reference to fig. 4, a difference between the fourth embodiment and the first embodiment is that the control identifier is set as a first control identifier, and the step of sending the first control identifier and all control data of the target control to the server by the data collection terminal includes:
step S31, when the data acquisition terminal receives a first filtering rule sent by the server, acquiring a second control identifier in the first filtering rule, wherein the second control identifier is a control identifier of a control to be filtered;
the data acquisition terminal and the server are in a real-time connection state, and the data acquisition terminal can receive the first filtering rule sent by the server in order to acquire accurate user behavior characteristic data. The data acquisition terminal can acquire the full data of the controls in the terminal, and the first filtering rule refers to that the data acquisition terminal is appointed to filter part of the controls which are meaningless at the local end and the control data.
In this embodiment, a control identifier in the data acquisition terminal is set as a first control identifier. And when the data acquisition terminal receives the first filtering rule sent by the server, acquiring a second control identifier in the first filtering rule. The second control identifier refers to the control identifier specified in the first filter rule.
Step S32, when the data acquisition terminal detects a first control identifier matched with a second control identifier, filtering all control data of the target control corresponding to the first control identifier and the first control identifier to obtain a new first control identifier and a new target control;
and step S33, the data acquisition terminal sends the new first control identifier and all control data of the new target control to the server.
After the second control identifier is acquired, the data acquisition terminal filters the first control identifier and the control data based on the second control identifier and the first filtering rule, essentially selectively intercepts the first control identifier and the control data acquired in the data acquisition terminal, and intercepts invalid or useless control data locally instead of sending the invalid or useless control data to the server side as sending data.
For example, it is assumed that the data acquisition terminal detects that data of a clock control changes, acquires and acquires a first spatial identifier and control data of the clock control, and there is no need for the control data of the clock control in the data acquired by the user behavior characteristics this time, that is, the control data of the clock control does not need to be used in the first filter rule sent by the server. Therefore, the data acquisition terminal can filter the first control identifier and the control data according to the second control identifier of the clock control in the first filtering rule and the first filtering rule, and acquire the new filtered first control identifier and the new control data, wherein the new first space identifier and the new control data do not contain any data information of the clock control. The first filtering rule can provide a second control identifier, and can also identify data belonging to the second control identifier in control data, so that the data can be filtered by the data acquisition terminal.
And after acquiring the new first control identifier and the new control data, the data acquisition device sends the new first control identifier and the new control data to the server for the server to call and analyze.
Further, in a real scene, a transmission channel is often abnormally disconnected in the data transmission process, and if a situation that the transmission channel is disconnected occurs in the process that the data acquisition terminal sends the encrypted data to the server, the encrypted data is not completely transmitted, and the interruption of the transmission process causes the transmitted encrypted data to become invalid data due to incompleteness, so that the result that the transmission and transmission of the encrypted data are failed is caused.
In this embodiment, the data acquisition terminal performs data splitting on the encrypted data according to a preset rule. The preset rule refers to a splitting rule of the encrypted data, the total byte length of the encrypted data can be obtained through detection, and the encrypted data are equally divided into data units with the same volume according to the total byte length, and then the data units to be sent are obtained. Each data unit is a tiny data packet, that is, the encrypted data is divided into a plurality of tiny data units to be sent, and the plurality of data units to be sent replace the complete encrypted data.
After acquiring each to-be-sent data unit obtained by splitting the encrypted data, the data acquisition terminal sends all to-be-sent data units to the server through the data transmission channel. In this embodiment, the encrypted data is not sent out in a single complete data packet, but is sent by a plurality of data units to be sent in the form of small data packets, so the data acquisition terminal can send the encrypted data in a breakpoint continuous transmission manner. Breakpoint continuous transmission refers to that transmission content is divided into a plurality of data units for transmission, and when the transmission content is reconnected after transmission connection, subsequent data units can be continuously transmitted from the last complete data unit.
For example, the number of data units to be transmitted by the data acquisition terminal is A, B, C, and the data acquisition terminal sequentially transmits the data units to be transmitted to the server according to the sequence A, B, C. Assuming that the data acquisition terminal completely transmits the data units a and B to the server, and the transmission connection channel between the data acquisition terminal and the server is suddenly disconnected during the transmission of the data unit C, the transmission of the data unit C is interrupted. Since the breakpoint continuous transmission mechanism is adopted in this embodiment, when the data acquisition device and the server resume the transmission connection channel, the data acquisition device obtains that the data unit A, B to be transmitted has been completely transmitted to the server by detecting the transmission state of the data unit A, B, C to be transmitted, and the data unit C to be transmitted has not been completely transmitted, so that the data acquisition terminal will not start transmitting from the data unit a to be transmitted again, but directly transmit from the data unit C to be transmitted, and thus the data units a and B to be transmitted that have been transmitted need not be transmitted again, but the encrypted data can still be completely transmitted to the server, and the transmission efficiency is improved.
Further, on the basis of the first embodiment of the non-buried point data collection method of the present invention, a fifth embodiment of the non-buried point data collection method is proposed, and referring to fig. 5, a difference between the fifth embodiment and the first embodiment is that the step of sending, by the data collection terminal, the control identifier and all control data of the target control to the server includes:
s34, the data acquisition terminal encrypts all control data of the control identifier and the target control by a symmetric algorithm to obtain encrypted data;
in this embodiment, in order to ensure that the control identifier and the control data are not stolen, tampered or forged by external malicious intent in the transmission process of sending the control identifier and the control data to the server, the data acquisition device encrypts the control identifier and the control data by an algorithm to obtain encrypted data. The encryption algorithm used in this embodiment is a symmetric algorithm, which refers to an encryption algorithm that uses the same key for encryption and decryption, and examples thereof include a DES algorithm, an AES algorithm, and an RC5 algorithm. The control identifier and the control data are encrypted through the symmetric algorithm, the data to be sent can be converted into encrypted data, and the symmetric algorithm needs to use the same secret key to encrypt and decrypt the data, so that even if the encrypted data is stolen in the transmission process, a stealer cannot acquire the real content of the encrypted data, the safety of the encrypted data is guaranteed, the information leakage of the encrypted data is avoided, and the transmission safety efficiency is improved.
And step S35, the data acquisition terminal sends the encrypted data to the server.
The encrypted data encrypted by the data acquisition terminal can be directly sent to the server. Because the server and the data acquisition device are kept in a connection state, after the data acquisition terminal encrypts the control identifier and the control data in an algorithm mode, the server can acquire the secret key of the encrypted data, and therefore the server decrypts the encrypted data in a symmetric algorithm mode, and further acquires the real data content of the encrypted data.
The invention provides a non-buried point data acquisition method, in a sixth embodiment of the non-buried point data acquisition method, referring to fig. 6, the non-buried point data acquisition method comprises the following steps:
step S40, the server acquires the control identifier and control data sent by the data acquisition terminal;
the server is used as a data processing center, and the hardware configuration and the setting of the functional modules are easier to expand, so that the server is mainly used for analyzing and processing the data acquired by the data acquisition terminal. Because the server is connected with the data acquisition terminal in real time, the server can detect the data sent by the data acquisition terminal in real time. Therefore, when the data acquisition terminal sends data information to the server, the server receives and acquires the control identifier and the control data transmitted by the data acquisition terminal.
Step S50, the server filters the control identifier and the control data based on a preset second filtering rule to obtain target control data;
and presetting a second filtering rule in the server, wherein the second filtering rule refers to a filtering rule for carrying out data filtering on the received control identifier and control data by the server.
When a certain control identifier is indicated to be filtered in the second filtering rule, it is proved that the second filtering rule filters all control information of the control object corresponding to the control identifier, and since the control data all have fixed control objects, the filtering of the control identifier is also the filtering of all control data carried by the control corresponding to the control identifier.
And the control identifier and the control data received by the server have data information which is partially invalid or useless. Therefore, the server can filter and intercept the data information, and interference of useless data on the useful data analyzed by the server is prevented. For example, if the second filter rule specifies that the control a or (part or all) of the control data of the control a referred to by the control identifier is intercepted, it is proved that the control a has no use in analyzing the user behavior feature data, or the control data of the control a may have a coupling effect on the control data of the control B to affect the analysis result, and the control data of the control B has a significant reference value for analyzing the user behavior feature. At this time, the server filters and screens the control A and the control data of the control A, which are referred by the control identifier, based on the second filtering rule, so as to intercept the control data of the control A. And the control data left after filtering and screening is the target control data.
And step S60, the server performs statistical analysis on the target control data to obtain a behavior feature analysis report.
The target control data is used as important analysis data of the user behavior characteristics, and after being screened and processed by the server, the server carries out statistical analysis on the target control data. Generally, data analysis of user behavior characteristics may be derived through computation of a data model. The data model is established, so that the change trends of different target control data in the user behavior characteristics can be more intuitively mapped. Through statistical analysis of the data model, an approximate model of the user behavior characteristics can be established, and of course, the more valuable data samples of the target control, the more accurate the data model can be obtained.
It is obvious in the data model that the target control data of different controls correspond to the weight coefficients on the data model, and the different target control data may have an association relationship with each other, and may affect each other or be affected, possibly being a front cause or possibly being a rear cause. And giving corresponding weight coefficients to the target control data, and obtaining a behavior characteristic analysis report through analysis and calculation among the weight coefficients.
Of course, the above-mentioned manner of obtaining the behavior feature analysis report through modeling is used as an implementation method of this embodiment, and is only used as a reference, and the manner of obtaining the behavior feature analysis report through statistically analyzing the target control data in this embodiment is not limited to the above-mentioned manner.
Further, on the basis of the sixth embodiment of the non-buried point data collection method of the present invention, a seventh embodiment of the non-buried point data collection method is proposed, and referring to fig. 7, a difference between the seventh embodiment and the sixth embodiment is that the step of the server obtaining the control identifier and the control data sent by the data collection terminal further includes:
step S70 is that the server sends a preset first filtering rule to the data acquisition terminal, so that the data acquisition terminal filters the acquired first control identifier and control data.
The first filtering rule is a data acquisition filtering rule preset by the server side, and because the method belongs to the field of non-buried point data acquisition, the acquired total data comprises a large amount of invalid useless data. In order to avoid the problem that a large amount of invalid useless data are sent to the server by the data acquisition terminal, a large amount of transmission resources are wasted, and the statistical analysis of the control data by the server is interfered. Firstly, the server sends a preset first filtering rule to the data acquisition terminal, and the data acquisition terminal performs preliminary filtering on part of controls or control data of part of controls based on the first filtering rule so as to screen and eliminate useless data information.
Further, on the basis of the sixth embodiment of the non-buried point data collection method of the present invention, an eighth embodiment of the non-buried point data collection method is proposed, and with reference to fig. 8, a difference between the eighth embodiment and the sixth embodiment is that the step of performing statistical analysis on the target control data by the server to obtain the behavior feature analysis report further includes:
step S80, the server analyzes data based on the behavior feature analysis report to obtain control collection rules;
the behavior characteristic analysis report obtained by the server can be used as reference content of the server optimization data acquisition strategy, and the change trend of the user behavior characteristic analysis can be summarized and obtained through further analysis of the behavior characteristic analysis report by the server. Data analysis needs to be performed from a multi-dimensional perspective because the behavior characteristics of users have rich variation trends. For example, the user has a very high frequency of launching application a, and the control data collected in the data collection terminal includes application B belonging to the same developer as application a. If the control data of the application B is intercepted and filtered in the previous filtering step, the server needs to modify the intercepting and filtering mechanism to further analyze the behavior characteristics of the user for different applications of the same developer, for example, analyze the behavior characteristic data of the application B, so as to obtain a more accurate behavior characteristic analysis report.
The server optimizes the design idea of the server for the data acquisition strategy based on the data analysis of the behavior characteristic analysis report, and the optimization mechanism needs to be realized by acquiring more control data, so that the server performs data analysis on the behavior characteristic analysis report and obtains a control acquisition rule. The control acquisition rule is optimized and improved aiming at the data acquisition mode of the data acquisition terminal so as to obtain a more advanced data acquisition mechanism.
And step S90, the server sends the control collection rule to the data collection terminal so that the data collection terminal can collect data in a targeted manner.
After the control acquisition rule is obtained through analysis, the data acquisition step is realized by the data acquisition terminal, so that the server sends the control acquisition rule value data acquisition terminal, the data acquisition terminal is used as an executor of the control acquisition rule, and targeted data acquisition is performed based on the control acquisition rule.
It should be noted that, in different data acquisition periods, such as the control acquisition rule obtained in the previous data acquisition and statistical analysis period, the control acquisition rule may be sent to the data acquisition terminal and applied in the steps of the data acquisition and statistical analysis period.
Referring to fig. 10, fig. 10 is a schematic device structure diagram of a hardware operating environment related to a method according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC, and can also be a terminal device such as a smart phone, a tablet computer, an electronic book reader, an MP3(Moving Picture Experts Group Audio Layer III, dynamic video Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, dynamic video Experts compression standard Audio Layer 4) player, a portable computer and the like.
As shown in fig. 10, the data acquisition system may include: a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002. The communication bus 1002 is used for realizing connection communication between the processor 1001 and the memory 1005. The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the data acquisition system may further include a user interface, a network interface, a camera, RF (Radio Frequency) circuitry, a sensor, audio circuitry, a WiFi module, and so forth. The user interface may comprise a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may also comprise a standard wired interface, a wireless interface. The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the data acquisition system configuration shown in fig. 10 does not constitute a limitation of the data acquisition system and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
As shown in fig. 10, a memory 1005, which is a kind of computer storage medium, may include an operating system, a network communication module, and a data collection program therein. An operating system is a program that manages and controls the hardware and software resources of a data collection system, supporting the operation of the data collection program as well as other software and/or programs. The network communication module is used to implement communication between the components in the memory 1005 and with other hardware and software in the data acquisition system.
In the data acquisition system shown in fig. 10, the processor 1001 is configured to execute a data acquisition program stored in the memory 1005, and the data acquisition system includes a data acquisition terminal and a server, and the data acquisition terminal is configured to:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
Preferably, the step of acquiring all control data of the target control by the data acquisition terminal includes:
the data acquisition terminal acquires all control data of the target control;
the data acquisition terminal identifies the data type of the control data;
and the data acquisition terminal performs data classification on the control data based on the data type to obtain normalized control data.
Preferably, the step of obtaining the control identifier of the target control comprises:
the method comprises the steps that a data acquisition terminal acquires control acquisition rules sent by a server, wherein the control acquisition rules comprise a control white list;
and the data acquisition terminal determines the control to be acquired based on the white list of the control and acquires the control identifier of the control to be acquired.
Preferably, the step of setting the control identifier as a first control identifier, and the step of sending the first control identifier and all control data of the target control to the server by the data acquisition terminal includes:
when a data acquisition terminal receives a first filtering rule sent by a server, acquiring a second control identifier in the first filtering rule, wherein the second control identifier is a control identifier of a control to be filtered;
when the data acquisition terminal detects a first control identifier matched with a second control identifier, filtering all control data of a target control corresponding to the first control identifier and the first control identifier to obtain a new first control identifier and a new target control;
and the data acquisition terminal sends the new first control identifier and all control data of the new target control to the server.
Preferably, the step of sending the control identifier and all control data of the target control to the server by the data acquisition terminal includes:
the data acquisition terminal carries out symmetric algorithm encryption on the control identifier and all control data of the target control to obtain encrypted data;
and the data acquisition terminal sends the encrypted data to the server.
The server in the data acquisition system is used for:
the server acquires a control identifier and control data sent by the data acquisition terminal;
the server filters the control identifier and the control data based on a preset second filtering rule to obtain target control data;
and the server performs statistical analysis on the target control data to obtain a behavior characteristic analysis report.
Further, the step of the server obtaining the control identifier and the control data sent by the data acquisition terminal further includes:
and the server sends a preset first filtering rule to the data acquisition terminal so that the data acquisition terminal can filter the acquired first control identifier and control data.
Further, the step of performing statistical analysis on the target control data by the server to obtain a behavior feature analysis report further includes:
the server analyzes data based on the behavior characteristic analysis report to obtain control collection rules;
and the server sends the control acquisition rule to the data acquisition terminal so that the data acquisition terminal can acquire data in a targeted manner.
The specific implementation of the data acquisition system of the present invention is basically the same as that of the above-mentioned non-buried point data acquisition method, and is not described herein again.
The present invention also provides a computer readable storage medium storing one or more programs, the one or more programs being further executable by one or more processors for:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control and acquires a control identifier of the target control;
and the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server.
The specific implementation of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the non-buried point data acquisition method and the data acquisition system, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. A non-buried point data acquisition method is characterized by comprising the following steps:
when a data acquisition terminal detects that data interaction exists at a preset acquisition position, determining a target control at the preset acquisition position;
the data acquisition terminal acquires all control data of a target control, receives a control acquisition rule sent by the server, determines a control to be acquired based on a control white list contained in the control acquisition rule, and acquires a control identifier of the control to be acquired, wherein the control acquisition rule specifies the control data of the control acquired by the data acquisition terminal;
the data acquisition terminal sends the control identifier and all control data of the target control to the server for statistical analysis by the server;
the step of acquiring all control data of the target control by the data acquisition terminal comprises the following steps:
the data acquisition terminal acquires all control data of the target control;
the data acquisition terminal identifies the data type of the control data;
and the data acquisition terminal performs data classification on the control data based on the data type to obtain normalized control data.
2. The method of claim 1, wherein the setting of the control identifier as a first control identifier, the step of the data collection terminal sending the first control identifier and all control data of the target control to the server comprises:
when a data acquisition terminal receives a first filtering rule sent by a server, acquiring a second control identifier in the first filtering rule, wherein the second control identifier is a control identifier of a control to be filtered;
when the data acquisition terminal detects a first control identifier matched with a second control identifier, filtering all control data of a target control corresponding to the first control identifier and the first control identifier to obtain a new first control identifier and a new target control;
and the data acquisition terminal sends the new first control identifier and all control data of the new target control to the server.
3. The method of claim 1, wherein the step of the data collection terminal sending the control identifier and all control data of the target control to the server comprises:
the data acquisition terminal carries out symmetric algorithm encryption on the control identifier and all control data of the target control to obtain encrypted data;
and the data acquisition terminal sends the encrypted data to the server.
4. A non-buried point data acquisition method is characterized by comprising the following steps:
the server acquires a control identifier and control data sent by the data acquisition terminal;
the server filters the control identifier and the control data based on a preset second filtering rule to obtain target control data;
the server carries out statistical analysis on the target control data to obtain a behavior characteristic analysis report;
the step of the server obtaining the control identifier and the control data sent by the data acquisition terminal further comprises the following steps:
and the server sends a preset first filtering rule to the data acquisition terminal so that the data acquisition terminal can filter the acquired first control identifier and control data.
5. The method of claim 4, wherein the step of the server statistically analyzing the target control data to obtain the behavioral characteristic analysis report further comprises:
the server analyzes data based on the behavior characteristic analysis report to obtain control collection rules;
and the server sends the control acquisition rule to the data acquisition terminal so that the data acquisition terminal can acquire data in a targeted manner.
6. A data acquisition system, characterized in that the data acquisition system comprises: a data acquisition terminal, a server, a memory, a processor, a communication bus and a data acquisition program stored on the memory,
the communication bus is used for realizing communication connection between the processor and the memory;
the processor is configured to execute the data acquisition program to implement the steps of the non-buried point data acquisition method according to any one of claims 1 to 5.
7. A computer-readable storage medium, having stored thereon a data acquisition program which, when executed by a processor, implements the steps of the burial-free data acquisition method as recited in any one of claims 1 to 5.
CN201710705108.4A 2017-08-16 2017-08-16 Non-buried point data acquisition method, system and computer readable storage medium Active CN107864065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710705108.4A CN107864065B (en) 2017-08-16 2017-08-16 Non-buried point data acquisition method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710705108.4A CN107864065B (en) 2017-08-16 2017-08-16 Non-buried point data acquisition method, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107864065A CN107864065A (en) 2018-03-30
CN107864065B true CN107864065B (en) 2020-11-24

Family

ID=61699260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710705108.4A Active CN107864065B (en) 2017-08-16 2017-08-16 Non-buried point data acquisition method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107864065B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109739717B (en) 2018-04-12 2021-01-26 京东方科技集团股份有限公司 Page data acquisition method and device and server
CN109948077B (en) * 2018-08-20 2023-09-01 中国印刷有限公司 User behavior data acquisition method, device, equipment and computer storage medium
CN109542529B (en) * 2018-10-26 2022-04-05 深圳壹账通智能科技有限公司 Function name-based point burying method and device, computer equipment and storage medium
CN111130956B (en) * 2018-10-30 2022-05-03 九阳股份有限公司 Data transmission method of intelligent household appliance and intelligent household appliance
CN109582827A (en) * 2018-11-30 2019-04-05 深圳市小牛普惠投资管理有限公司 Nothing buries point data acquisition method, device, computer equipment and storage medium
CN109828750B (en) * 2019-01-09 2022-07-19 西藏纳旺网络技术有限公司 Method and device for automatically configuring data embedded points, electronic equipment and storage medium
CN110032493A (en) * 2019-03-13 2019-07-19 平安城市建设科技(深圳)有限公司 Monitoring method, device, terminal and the readable storage medium storing program for executing of the page
CN110046072A (en) * 2019-03-13 2019-07-23 平安城市建设科技(深圳)有限公司 Monitoring method, device, terminal and the readable storage medium storing program for executing of the page
CN110633205A (en) * 2019-06-20 2019-12-31 北京无限光场科技有限公司 Method and device for detecting embedded point event, terminal equipment and medium
CN110515679B (en) * 2019-08-28 2023-09-19 北京思维造物信息科技股份有限公司 Data acquisition method, device, equipment and storage medium
CN111026317A (en) * 2019-11-28 2020-04-17 爱钱进(北京)信息科技有限公司 Method, device and storage medium for determining user operation
CN113032252A (en) * 2021-03-15 2021-06-25 深圳市麦谷科技有限公司 Method and device for collecting buried point data, client device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572043A (en) * 2013-10-16 2015-04-29 阿里巴巴集团控股有限公司 Method and device for embedding points for controls of client application in real time
CN105376335A (en) * 2015-12-15 2016-03-02 北京奇虎科技有限公司 Method and device for collection data uploading
CN105630512A (en) * 2016-02-17 2016-06-01 北京高绎信息技术有限公司 Method and system for implementing mobile device data tracking through software development toolkit
CN106598868A (en) * 2016-12-24 2017-04-26 上海亿账通互联网科技有限公司 Dynamic point burying method and system for application program of client
CN106933472A (en) * 2017-05-20 2017-07-07 南京西桥科技有限公司 A kind of user behavior data acquisition system and its control method based on mobile phone A PP
CN107018046A (en) * 2017-06-06 2017-08-04 上海鋆创信息技术有限公司 A kind of collecting method, device, terminal and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130091218A1 (en) * 2011-09-14 2013-04-11 Amiad Solomon System and method for providing content services to network users without installation of client software

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572043A (en) * 2013-10-16 2015-04-29 阿里巴巴集团控股有限公司 Method and device for embedding points for controls of client application in real time
CN105376335A (en) * 2015-12-15 2016-03-02 北京奇虎科技有限公司 Method and device for collection data uploading
CN105630512A (en) * 2016-02-17 2016-06-01 北京高绎信息技术有限公司 Method and system for implementing mobile device data tracking through software development toolkit
CN106598868A (en) * 2016-12-24 2017-04-26 上海亿账通互联网科技有限公司 Dynamic point burying method and system for application program of client
CN106933472A (en) * 2017-05-20 2017-07-07 南京西桥科技有限公司 A kind of user behavior data acquisition system and its control method based on mobile phone A PP
CN107018046A (en) * 2017-06-06 2017-08-04 上海鋆创信息技术有限公司 A kind of collecting method, device, terminal and storage medium

Also Published As

Publication number Publication date
CN107864065A (en) 2018-03-30

Similar Documents

Publication Publication Date Title
CN107864065B (en) Non-buried point data acquisition method, system and computer readable storage medium
CN107612909B (en) Information interaction method, device and equipment about Internet of things equipment
EP3541043B1 (en) Account login method and apparatus
EP3772700A1 (en) Method and device for encrypting model of neural network, and storage medium
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN107750466A (en) Use equipment near synchronized cue pairing
US20140043480A1 (en) Video monitoring system and method
CN106598678A (en) Method and device for supplying application installation packages to terminal equipment
KR101496632B1 (en) System for safe contents service for youths and method therefor
CN107622117B (en) Image processing method and apparatus, computer device, computer-readable storage medium
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things
CN106911761B (en) Bluetooth device control method and system based on iBeacon
CN111241559A (en) Training model protection method, device, system, equipment and computer storage medium
WO2021072846A1 (en) Position acquisition method and apparatus, and storage medium and electronic device
KR20190026115A (en) Method for operating process of manufacturing equipment based on cloud connector and computer readable record medium on which a program therefor is recorded
JP2017511089A (en) Method, apparatus, program and recording medium for accessing network
KR20150132800A (en) Terminal, Cloud Apparatus, Driving Method of Terminal, Method for Providing Cloud Service, Computer Readable Recording Medium
CN112020120A (en) Network configuration method, device, equipment and system
KR102244635B1 (en) Control system for hazardous chemicals release preventing
CN110398985B (en) Distributed self-adaptive unmanned aerial vehicle measurement and control system and method
CN103514396B (en) File/applied program processing method and device on communication terminal
KR101971538B1 (en) Management method for industrial cloud connector and computer readable record medium on which a program therefor is recorded
CN113467965A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN109995782B (en) Information processing method, device, system and computer storage medium
CN112908321A (en) Device control method, device, storage medium, and electronic apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20180528

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen one ledger Intelligent Technology Co., Ltd.

Address before: 200000 Xuhui District, Shanghai Kai Bin Road 166, 9, 10 level.

Applicant before: Shanghai Financial Technologies Ltd

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant